alberties / Ghostfuscator
The Python Password-Protected Obfuscator
☆34Updated 5 years ago
Alternatives and similar repositories for Ghostfuscator:
Users that are interested in Ghostfuscator are comparing it to the libraries listed below
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆45Updated 4 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- ☆15Updated 2 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 5 months ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Random stuff☆16Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- Methods of C2☆21Updated 9 years ago